A. Deliverable, 3: ASLan final version with dynamic service and policy composition, 2010.

A. Barros, M. Dumas, and P. Oaks, A Critical Overview of the Web Services Choreography Description Language (WS-CDL). BPTrends, 2005.

K. Bhargavan, R. Corin, P. Deniélou, C. Fournet, and J. J. Leifer, Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, 2009 22nd IEEE Computer Security Foundations Symposium, pp.124-140, 2009.
DOI : 10.1109/CSF.2009.26

P. Bieber, A logic of communication in hostile environment, [1990] Proceedings. The Computer Security Foundations Workshop III, pp.14-22, 1990.
DOI : 10.1109/CSFW.1990.128181

T. Bultan, J. Su, and X. Fu, Analyzing conversations of Web services, IEEE Internet Computing, vol.10, issue.1, pp.18-25, 2006.
DOI : 10.1109/MIC.2006.1

M. Carbone, K. Honda, and N. Yoshida, Structured communicationcentred programming for web services, Proceedings of the 16th European conference on Programming, ESOP'07, pp.2-17, 2007.

U. Carlsen, Generating formal cryptographic protocol specifications, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp.137-146, 1994.
DOI : 10.1109/RISP.1994.296586

Y. Chevalier, M. A. Mekki, and M. Rusinowitch, Orchestration under Security Constraints, Sixth International Workshop on Formal Aspects in Security and Trust (FAST2009) Eindhoven, the Netherlands, 2009.
DOI : 10.1007/11805618_21

URL : https://hal.archives-ouvertes.fr/hal-00642855

Y. Chevalier, M. A. Mekki, and M. Rusinowitch, Automatic Composition of Services with Security Policies, 2008 IEEE Congress on Services, Part I, pp.529-537, 2008.
DOI : 10.1109/SERVICES-1.2008.13

URL : https://hal.archives-ouvertes.fr/inria-00330338

Y. Chevalier and M. Rusinowitch, Compiling and securing cryptographic protocols, Information Processing Letters, vol.110, issue.3, pp.116-122, 2010.
DOI : 10.1016/j.ipl.2009.11.004

URL : https://hal.archives-ouvertes.fr/inria-00527633

G. Denker and J. Millen, CAPSL integrated protocol environment, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.207-221, 2000.
DOI : 10.1109/DISCEX.2000.824980

F. J. Fabrega, J. C. Herzog, and J. D. Guttman, Strand spaces: why is a security protocol correct? In Security and Privacy, Proceedings. 1998 IEEE Symposium on, pp.160-171, 1998.

J. D. Guttman, J. C. Herzog, J. D. Ramsdell, and B. T. Sniffen, Programming Cryptographic Protocols, Trust in Global Computing, pp.116-145, 2005.
DOI : 10.1007/11580850_8

J. Mccarthy and S. Krishnamurth, Trusted Multiplexing of Cryptographic Protocols, Sixth International Workshop on Formal Aspects in Security and Trust (FAST2009) Eindhoven, the Netherlands, 2009.
DOI : 10.1007/978-3-642-12459-4_16

J. Millen and F. Muller, Cryptographic protocol generation from CAPSL, 2001.

S. Mödersheim, Algebraic Properties in Alice and Bob Notation, 2009 International Conference on Availability, Reliability and Security, pp.433-440, 2009.
DOI : 10.1109/ARES.2009.95

M. Turuani, The CL-Atse Protocol Analyser, Term Rewriting and Applications (Proceedings of RTA'06), pp.277-286, 2006.
DOI : 10.1007/11805618_21

URL : https://hal.archives-ouvertes.fr/inria-00103573

W. World-wide and . Consortium, Web Services Choreography Description Language Version 1.0, 2005.